85%(20)17 out of 20 people found this document helpful
This preview shows page 4 - 5 out of 7 pages.
TrueFalseQUESTION 25In a flat network, a workstation can communicate with any other computer on the network because it has few controls, or none, tolimit network traffic.2 points SavedSavedQUESTION 26In an LAN domain, a_______________ is similar to a hub but can filter traffic, a ______________ connects LANs, or a LAN and a2 points SavedQUESTION 27In order to move data from an unsecure WAN to a secure LAN, you typically begin by segmenting a piece of your LAN into a_________________________, which sits on the outside of your private network facing the public Internet. Servers in this areaprovide public-facing access to the organization, such as public Web sites.2 points SavedSavedQUESTION 28In recent years, ___________________ has emerged as major technology. It provides a way of buying software, infrastructure, andplatform services on someone else’s network.2 points SavedTrueFalseQUESTION 29It is generally recommended that security policies should focus on specific products rather than product capabilities because it isimportant that there is a uniformity of devices across an organization. This consistency makes security policies easier to enforce.2 points SavedQUESTION 30Many organizations have a(n) _____________ policy in place to manage the business concern of how to handle sensitiveinformation in physical form, such as reports. This policy generally requires employees to lock up all documents and digital media at2 points SavedQUESTION 31Hierarchical models have many advantages to organizations, but there are also a number of disadvantages. Which of the followingis one of the disadvantages?2 points SavedSaved